ADTs illustrate the principle of ____.

A. information hiding
B. privacy
C. encapsulation
D. overloading

Answer: A

Computer Science & Information Technology

You might also like to view...

One common vulnerability exploitation method is a_______, in which a program is overwhelmed by an input of more data than it has allocated space for.

a) buffer overflow. b) memory flood. c) buffer flood. d) None of the above

Computer Science & Information Technology

What types of filters can be used to search for packages?

What will be an ideal response?

Computer Science & Information Technology